Arguments for Open Internet Access

by Mike on November 15, 2015

in News

Starting on October 19th, the Electronic Frontier Foundation (EFF) began celebrating Open Access Week to generate awareness and support for the campaign to preserve and regain open access to content. EFF joined several groups including the international alliance of academic and research libraries SPARC, which works so that scholars can communicate more openly for better results all around. We support open access as well, or the belief that when research and other content of importance is made freely available online for sharing, we can all benefit from the spread of knowledge and ideas. This year, the EFF released discussions on a few open access topics of interest. We’ve outlined some of the more salient points below to help spread the word. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

Australia Data Retention Begins Now

by Mike on November 15, 2015

in News

Australia proposed a new data retention law last March which passed in early April and today takes effect officially. ISPs in Australia will now have to retain the data of Internet and phone users by law. The two-year period for data to be kept by these companies poses serious risks for all users. Not only will the government be able to access all this data at any time and without the need for warrants, but the databases that will be filled with this data are going to be shared with third parties and are also just another target for hackers and scammers.

Metadata and Privacy

The Australian data retention law, Telecommunications (Interception and Access) Amendment (Data Retention), requires all phone and Internet Service Providers to collect and keep the metadata of their customers for two years. From today, all the phone calls that people in Australia make and all the websites that they visit will be a matter of record that the government can look into anytime they want. Only metadata is being recorded, but this is enough to show who you talk to and exchange information with, where you spend money, and when it all happened. The exact contents of communications and interactions are not known, but metadata tells enough. Users can be profiled and matched with other users to create detailed descriptions of their behavior and associations.

These profiles that will be created expose users to unwanted scrutiny, which is a violation of privacy. It doesn’t matter whether these people have done anything wrong. Their lives will be tracked and filed from today, and this information will be made available to the government and a number of third parties as well. ISPs routinely share user information with marketing companies, for instance, so that ads can be created based on specific user profiles. So at the same time that users face mass surveillance threats, they are also facing more ads and a bigger privacy threat as more of their data is fed to advertisers. On top of all this, there will soon be databases full of metadata that will become targets for identity thieves and other ne’er-do-wells.

The bottom line is that metadata collection means users are being targeted by governments, corporations and criminals all at the same time.

More Suffering for Users

ISPs like Optus, Telstra and Vodafone are prepared to begin collecting user metadata with the help of the first installment of the $131 million Australian dollar fund for the project. These bigger ISPs will also have to do their part, but they are established and can carry the load. There is no news about how much of the burden will be passed on to users in terms of higher service fees, but it is almost a certainty that users will have to pay more to cover the costs of compliance with the data retention plan. There is also a general feeling that many small providers will be unable to continue doing business because of the high costs. This is of course bad for them but also bad in general because it will disrupt the balance in favor of big companies.

The metadata collected by those ISPs who survive will be put on databases that the government can search any time they feel like it. There is no need for the government to secure any warrants before they can access this user information, which makes it a very scary thing. With warrants, at least the government would need a good reason before they can snoop around in users’ personal lives. As it is, any agency can have a look without giving any reason at all.

Metadata Protection

If you live in Australia, there is no way to get around this new data retention scheme unless you plan on living your life completely unplugged, with no phone and no Internet. But you can prevent your ISPs from knowing what you are really doing online by using a VPN. They will still be collecting some metadata, but your traffic will be encrypted so that they cannot read it. It will also be sent through a private tunnel where they cannot follow. Whatever profiles they will be able to create based on VPN rerouted traffic will be insufficient and inaccurate. As far as phones go, there are many services that can encrypt your calls as well. Just be careful to make sure that whatever services you choose to use, they are not handing over your data to the government behind your back.

With the proper tools, you can stay in control of what information you choose to keep private despite the huge net that the Australian government has thrown out over the land.

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

Free Proxy is not good – Why?

by Mike on October 30, 2015

in VPN

Internet users who are using free proxy services or are looking to obtain the services of a free proxy in the near future should understand the fact that free proxy is not good option. Since proxy services can be used for free, many internet users choose them for their internet needs. Free proxy is no way close to the features offered by a Virtual Private Network. Virtual Private Network is the best solution available for internet users and this truth would be understood by the internet users at the end of this article for sure. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

What can you do with a VPN connection?

by Mike on October 30, 2015

in VPN

VPN service is used by internet users to achieve a lot of beneficial features. Virtual Private Network is mainly for those who are looking to get rid of internet restrictions and access all the websites they need. Business owners and professionals who travel to different countries or locations should be able to gain access and at the same time should stay secured. VPN connection can be used by internet users to get a lot of attractive features and all these features are discussed in detail. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

Revelation of Wi-Fi security

by Mike on September 9, 2015

in Security

Wireless internet connection is very popular in the present generation and it is mainly because of its ease in operation. Individuals can connect to a Wi-Fi network using all their devices and there is no need for establishing any physical connection with the router or the server that provides the internet network. This eliminates the need for having to be situated in a particular location in order to access the websites required by the individual. Security is very important for those who are accessing the internet using Wi-Fi. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

How to stay secure when abroad

by Mike on August 5, 2015

in VPN

People who travel abroad should make sure that they have the necessary security to protect their data and the device used by them. Many governments have also issued warnings to their citizens who are travelling abroad to safeguard their data. Many incidents of virus attacks and hacking attacks on PCs, laptops, smartphones and tablets have been reported and all these incidents have caused major damage to the users. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

5 Tips for online privacy

by Mike on August 5, 2015

in VPN

Internet users have to overcome online risks in order to protect their personal and official data. Online privacy is very important in the present era because of the kind of risks and the damage that these risks could cause the user. Business organizations and individuals can protect their data by ensuring online privacy through certain ways. Virtual Private Network is an effective solution to protect the data possessed by the user. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

Privacy on Snowden Revelations Anniversary

by Mike on July 23, 2015

in News

It’s been a little over two years since Edward Snowden first let the cat out of the bag and the world found out about the secret mass surveillance of the National Security Agency. The first document revealed to the public was the order for telecom Verizon to release all records of US phone calls to the agency under the Patriot Act’s Section 215. Many others followed, uncovering the secret surveillance of other agencies as well, and two years later the world is still reeling from the effects of the widespread mass spying that we now know has been going on for over a decade. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

Secure Your Smartphone in Ten Easy Steps

by Mike on July 16, 2015

in News

This is not the first article we have done about mobile phone security, and it is not likely to be the last. smartphone security is very important because these devices have several vulnerabilities despite and sometimes because of all their awesome modern features. We like to keep you, our readers, updated with the latest and greatest smart ways to protect yourself from identity theft, account hacks and so many more dangers that threaten all smartphone users. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }

How can you track your info shared online?

by Mike on June 25, 2015

in VPN

Internet users should understand one basic reality and that is, their files can be tracked down online using all possible means. Most of the business organizations, online tracking agencies and even ISPs track down the internet activity performed by users and also could easily find out the data that one might share online using their IP address. In certain countries, Government organizations track down the files shared by their country based internet users. [click to continue…]

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

{ 0 comments }